| 2005 | A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. Zonghua Zhang, Hong Shen |
| 2005 | A New Class of Codes for Fingerprinting Schemes. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau |
| 2005 | A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications. Kung Chen, Chih-Mao Huang |
| 2005 | A Restricted Multi-show Credential System and Its Application on E-Voting. Joseph K. Liu, Duncan S. Wong |
| 2005 | A Task-Oriented Access Control Model for WfMS. Xu Liao, Li Zhang, Stephen Chi-fai Chan |
| 2005 | An Email Worm Vaccine Architecture. Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo |
| 2005 | An Empirical Study on the Usability of Logout in a Single Sign-on System. Mikael Linden, Inka Vilpola |
| 2005 | An Identity-Based Grid Security Infrastructure Model. Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li |
| 2005 | An Open Approach for Designing Secure Electronic Immobilizers. Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble |
| 2005 | Computer Vulnerability Evaluation Using Fault Tree Analysis. Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang |
| 2005 | Conformance Checking of RBAC Policy and its Implementation. Frode Hansen, Vladimir A. Oleshchuk |
| 2005 | Countermeasures for Preventing Comb Method Against SCA Attacks. Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau |
| 2005 | Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari |
| 2005 | Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu |
| 2005 | Hiding Data in Binary Images. Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin |
| 2005 | Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou |
| 2005 | Measuring Resistance to Social Engineering. Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes |
| 2005 | Model Redundancy vs. Intrusion Detection. Zhuowei Li, Amitabha Das, Sabu Emmanuel |
| 2005 | Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati |
| 2005 | On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. Zuowen Tan, Zhuojun Liu, Mingsheng Wang |
| 2005 | POSSET - Policy-Driven Secure Session Transfer. Philip Robinson, Christian Schaefer, Thomas Walter |
| 2005 | Performance Analysis of CDMA-Based Watermarking with Quantization Scheme. Yanmei Fang, Limin Gu, Jiwu Huang |
| 2005 | Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications. Heejin Park, Sang-Kil Park, Ki-Ryong Kwon, Dong Kyue Kim |
| 2005 | Protecting Mass Data Basing on Small Trusted Agent. Fangyong Hou, Zhiying Wang, Kui Dai, Yun Liu |
| 2005 | Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks. Hany A. Samuel, Yasser H. Dakroury, Hussein I. Shahein |
| 2005 | Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
| 2005 | Robust Routing in Malicious Environment for Ad Hoc Networks. Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh |
| 2005 | Secure Software Delivery and Installation in Embedded Systems. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi |
| 2005 | Security On-demand Architecture with Multiple Modules Support. Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang |
| 2005 | Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. Patrick P. Tsang, Victor K. Wei |
| 2005 | Token-Controlled Public Key Encryption. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
| 2005 | Towards Multilateral-Secure DRM Platforms. Ahmad-Reza Sadeghi, Christian Stüble |
| 2005 | Tracing Traitors by Guessing Secrets. The Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau |
| 2005 | Using Trust for Restricted Delegation in Grid Environments. Wenbao Jiang, Chen Li, Shuang Hao, Yiqi Dai |
| 2005 | Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. André Adelsbach, Sebastian Gajek, Jörg Schwenk |